当前位置:网站首页>Authentication and access control
Authentication and access control
2022-04-22 02:35:00 【Yuxuan won't be bald】
- static password (password)
Password based authentication is a common technology .
Users first register their user name and login password in the system . The system stores the user name and password internally . In the database , This password is generally valid for a long time , Therefore, it is also called static password .
Identity authentication technology based on static password has been widely used because of its simplicity and low cost . But there are serious security problems in this way , Security depends only on passwords , Once the methotrexate leaks , Users may be counterfeited . - One-time password (one time password)
In order to overcome various security risks caused by static password , Dynamic password authentication has gradually become the mainstream technology of password authentication .
The user's password is different every time he logs in to the system , have “ One secret at a time ” Characteristics , Effectively ensure the security of user identity .
Payment at bank 、 Online bank transfer 、 Static passwords are generally used in transactions + Dynamic password combination for authentication , This double guarantee can greatly improve the safety of use .
What biological characteristics can you prove ?

Identity Authentication ———— The system confirms the identity of the visitor
Access control model

版权声明
本文为[Yuxuan won't be bald]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/04/202204220233503015.html
边栏推荐
- How to batch modify file names and photo file names
- XSS cross site script attack learning record
- What do you learn about programming
- How to restrict the unity of code
- 软件测试·坏味道
- MySQL8. 0 zero foundation beginner level: from bronze to diamond
- MySQL Chapter 1 Introduction to database
- Translation of yolov3 papers
- 使用navicat将mangodb的数据做转储
- 云服务器如何连接 AD 域或 LDAP 用户源
猜你喜欢

STM32 can communication experiment

Unity Game Optimization - Third Edition 阅读笔记 Chapter 1 分析性能问题

【※ LeetCode 剑指 Offer 13. 机器人的运动范围(简单)】

风控产品定额的陷阱都有哪些?

STM32 flash operation

Eight common probability distribution formulas and visualization
![[Xiao Yang takes you to play with C language] circular structure (detailed explanation)](/img/78/407cfec7557c42bc66e55360436605.png)
[Xiao Yang takes you to play with C language] circular structure (detailed explanation)

像堆乐高一样解释神经网络的数学过程

CTF wiki local construction record

How does ECS connect to ad domain or LDAP user source
随机推荐
Pychar executes multiple script files at the same time
WSOLA原理及matlab仿真
Improvement of ref and struct in C 11
Can initialization process
C语言字符分类与转换
How to batch modify file names and photo file names
JS regular expression -- commonly used by individuals
Embedded AI
error:there‘s no Qt version assigned to project please assign a Qt installation in qt project settin
Analysis of five data structures of redis
【时序】DCRNN:结合扩散卷积和GNN的用于交通流量预测的时空预测网络
Go use options mode to set parameters
C指针和数组深度汇总
身份认证和访问控制
Swift 泛型的使用
uni-list的插件导入及使用方法
Use of swift universal types anyobject and any
区间合并板子
Scala installation and environment configuration
2022年软件设计师考试知识点:线性表